Now you can uncover hidden devices on your network as well as smartphones, tablets, virtual machines, and laptops that come and go between scheduled scans. What you haven’t been seeing or scanning will surprise you — and could be jeopardizing compliance. If it has an IP address or is using your network, McAfee Asset Manager can discover and assess it in real time, revealing the compliance of all assets on your network.

An agentless solution which provides a real-time inventory of all devices connected to the network, including device profiles and the identities of device users, and creates a physical network topology for each site

Virtual environments mapping showing the exact mapping of the virtual guest to its host

Rapid deployment with one-time installation, no agents, and no required infrastructure changes

Features & Benefits

Know what you are protecting

Eliminate the guesswork. McAfee Asset Manager provides total visibility into your network, including managed, unmanaged, physical, and virtual devices. Essential network, device, and user intelligence provides the context needed to eliminate ambiguity and facilitate better decision making based on accurate and in-depth audit information. Network information is continuously collected in real time to reflect the current state of the network, enabling complete control over the security, management, and compliance status of your enterprise network.

Implement real-time operation

Detect changes to the network and the devices connected to it as they occur. For example, McAfee Asset Manager can detect a new device as it is being attached to the network, or match a user ID to the IP address it is using as soon as the user authenticates to the network.

Track devices according to their media access control (MAC) addresses

See changes with devices operating on the network. The information collected also includes changes made to the device reflecting the operation of third-party solutions.

Provide agentless virtualized environments mapping

Discover and track virtualized environments without the use of software-based agents, map between virtual guest devices and the physical system they depend on, and audit the configuration of virtual assets, generating information similar to what is provided for physical devices.

Build a physical network topology

Create and maintain, in real time, the physical topology of your network. McAfee Asset Manager makes it easy to locate devices throughout the enterprise network and use that information to troubleshoot management-related issues.

Get real-time network activity alerts

Receive notification of events happening on your network in real time and then export that activity to the syslog which integrates with third-party applications such as a SIEM.

Save time with rapid deployment

Generate results in just a few hours. With minimal prerequisites, no physical infrastructure changes, and agentless operation, it is easy to implement and configure McAfee Asset Manager.

Get a fast return on investment

Provide instant, complete, and accurate network, device, and user intelligence, allowing IT professionals to complete tasks both quickly and efficiently.

System Requirements

These are general sizing guidelines for McAfee Asset Manager Console and Sensor. Specific analysis may be required for more accurate and detailed planning and sizing of McAfee Asset Manager deployments, especially for large sites. For more information on specifications, download the McAfee Asset Manager 6.6 Deployment Guide.

Solution Briefs

Trust is no longer present when the privacy, integrity, and authenticity of our information is called into question. Learn how you can protect your company against attacks that attempt to exploit the BERserk vulnerability.

Attackers prey upon the institution of trust in many ways, with exploiting unsuspecting victims the primary pursuit. Learn how McAfee security technology can help protect against attacks seeking to abuse the trust your company has in its day-to-day operations.

McAfee Vulnerability Manager has a new web scanning capability, allowing you to discover, crawl, assess, report, and manage the vulnerabilities discovered in any number of internal or external web applications.

Raytheon SureView integration with McAfee ePolicy Orchestrator (McAfee ePO)
software enables governmental and commercial enterprises to deploy and seamlessly
manage command and control of SureView clients across the entire organization
through their existing infrastructure, allowing for speedy implementation and efficient
management of an effective cyberaudit program.

White Papers

Critical Security Controls (CSCs) help organizations break down operational silos by providing a pragmatic blueprint detailing where to focus efforts to achieve the greatest results. This white paper maps the quick wins within the first five CSCs to associated McAfee products, services, and partner solution capabilities — all part of the Security Connected platform.

Learn how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies to provide context around application usage, user behaviors, and other operations — for better, more accurate reporting.

Community

Blogs

Today the SANS Institute released its survey on adoption of the Top 20 Critical Security Controls (CSCs) for Effective Cyber Defense. It’s a worthwhile read for CISOs and security analysts charged with overseeing security and risk management. The survey documents adoption highlights and hurdles, primarily experienced by financial services and government organizations. Three sets of findings […]

My book on Risk and the Internet of Things (RIOT) is coming along well and a colleague CTO, Greg Brown, now part of the effort. As it turns out, there is a lot to write about and the book is taking longer than first planned. 2+ years and counting. 300 + manuscript pages and growing! […]

The third meeting of the International Standards Organization’s (ISO) Special Working Group (SWG) on (Internet of Things) recently took place in Chongqing, China. The purpose of the SWG is essentially to assess what has been done to date related to IoT standards and provide guidance to ISO about the ISO so that the existing standards […]

Threats and vulnerabilities are a way of life for IT admins. With the continued rise of computer and network attacks, the threat of a critical attack is virtually constant. With complex software it is all but guaranteed that there will be vulnerabilities for attackers exploit. And the sheer volume of attack vectors for attackers to […]

One of PCI’s goals is to make sure data security is taken seriously and they are encouraging merchants to incorporate it into ‘business as usual’ practices. Some of the areas where additional clarification was given are what I categorize as managing risk, vulnerabilities and changes. PCI-DSS should not be a check the box, or ‘Simon […]